A deep dive into a real-world GuLoader malware incident disguised as a Swift payment request
I didn’t expect a cyber attack disguised as a Swift transaction to land in my inbox. But on July 10, 2025, I received a very polished email that claimed to be from a business contact, complete with official-sounding language, phone numbers, and even a company website.
The subject?
“Fw: Swift Copy:0008/025/05/06_dt.07/09/25 by SANWAR MAL SUREKA Insurance & Investment Advisors”
The message claimed to be from “Sreekumar K S” of Mor Aqua Fresh, referencing an overdue balance and requesting payment confirmation. It included a password-protected .lzh archive, presented as supporting documentation, and even provided a password for access — a tactic often used in legitimate financial correspondence.
At first glance, everything seemed in order: the email was polite, well-formatted, and included branding and contact numbers. But behind the professional facade lurked something far more sinister.

This was no payment request — it was a delivery mechanism for GuLoader, a sophisticated malware dropper often used to load Remote Access Trojans (RATs), credential stealers, and surveillance tools. What followed was a deep dive into obfuscation, memory injection, and the kind of social engineering that even seasoned professionals must stay vigilant against.
In this post, I’ll walk you through how I analyzed the threat, uncovered its behavior, and understood how it cleverly slipped past even Gmail’s robust security filters.
GuLoader (also known as CloudEyE) is a popular malware loader first observed in 2019. It is commonly used to:
It typically arrives via phishing emails and employs techniques like:
The malware is widely sold on underground forums and used by various threat groups due to its modularity and stealth.
The email came from a legit-looking Gmail address (as21185@gmaildotcom) with valid SPF, DKIM and DMARC authentication.


Once extracted using the password, the “.lzh” file revealed a Windows executable:
Attached File
091208478 DTD 10.07.2025 09750913 640976289-85665.exe (inside .lzh)310921680
Metadata:

This is consistent with GuLoader characteristics – fake metadata, NSIS-based shellcode loader and packing to avoid detection.
TRiD:

Behaviour Summary (from Any.Run)
system.dll) to %TEMP%VirtualAlloc, WriteProcessMemory, Createthread for shellcode injectionwmlaunch.exe, slui.exe)
Although the report showed no plaintext C2 domain, analysis indicates that GuLoader:
Even without clear C2 in strings, the behaviour matches known GuLoader indicators:
GuLoader is a loader trojan sold on underground markets. It’s widely used by threat actors to:
Trojan:Win32/GuLoader.RAZ!MTBHEUR:Trojan.Win32.Makoob.genTrojan.GuLoaderScr.NSISHeur!gen3
F54C3C32364C91454BEA24A1E6B987134668DC8468E677499828C63E313945125134803D6C96FE431BB71C332A64BE49%TEMP%\System.dllHKCU\Software\Locales ApproxHKCU\washoan\Uninstall\blodfattigsteHKCU\bowline\elice\lseplanerswmlaunch.exeslui.exeProcesses
Process 2040 –

Process 5612 –

Process 7092 –


This real-world attack shows how easily cybercriminals can blend into daily business communication. The email successfully bypassed:
The payload, GuLoader, delivered stealthy second-stage malware using:
This incident is a stark reminder that security is not just about technology — it’s about awareness. Even the most well-crafted emails must be scrutinized, especially when they include executable attachments.